Keyword List
Japanese Page
SITE TOP
Login
To browse Full-Text PDF.
>
Forgotten your password?
Menu
Search
Full-Text Search
Search(JPN)
Latest Issue
A Fundamentals
Trans.Fundamentals.
JPN Edition(in Japanese)
B Communications
Trans.Commun.
JPN Edition(in Japanese)
C Electronics
Trans.Electron.
JPN Edition(in Japanese)
D Information & Systems
Trans.Inf.&Syst.
JPN Edition(in Japanese)
Abstracts of JPN Edition
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
-
Archive
Volume List
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
Transactions (1976-1990)
Volume List [JPN Edition]
A JPN Edition(in Japanese)
B JPN Edition(in Japanese)
C JPN Edition(in Japanese)
D JPN Edition(in Japanese)
-
Editorial Board
Editorial Board
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
Archive
Editorial Board[JPN Edition]
A JPN Edition(in Japanese)
B JPN Edition(in Japanese)
C JPN Edition(in Japanese)
D JPN Edition(in Japanese)
Archive
-
Open Access Papers
Trans. Commun. (Free)
Trans. Commun.
Trans. Commun.(JPN Edition)
Trans. Electron. (Free)
Trans. Electron.
Trans. Electron.(JPN Edition)
Trans. Inf.&Syst. (Free)
Trans. Inf.&Syst.
Trans. Inf.&Syst.(JPN Edition)
-
Link
Subscription
For Authors
Statistics:
Accepting ratio,review period etc.
IEICE Home Page
-
Others
Citation Index
Privacy Policy
Copyright & Permissions
Copyright (c) by IEICE
Keyword : privacy amplification
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
Qiuhua WANG
Mingyang KANG
Guohua WU
Yizhi REN
Chunhua SU
Publication:
Publication Date:
2020/02/01
Vol.
E103-D
No.
2
;
pp.
230-238
Type of Manuscript:
Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category:
Network Security
Keyword:
secret key generation
,
physical-layer security
,
channel reciprocity
,
information reconciliation
,
privacy amplification
,
Summary
|
Full Text:PDF
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication
Shun WATANABE
Yasutada OOHAMA
Publication:
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date:
2010/11/01
Vol.
E93-A
No.
11
;
pp.
1976-1983
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications)
Category:
Cryptography and Information Security
Keyword:
Bin coding
,
Gaussian sources
,
privacy amplification
,
quantization
,
rate limited public communication
,
secret key agreement
,
Summary
|
Full Text:PDF
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code
Shun WATANABE
Ryutaroh MATSUMOTO
Tomohiko UYEMATSU
Publication:
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date:
2010/09/01
Vol.
E93-A
No.
9
;
pp.
1650-1659
Type of Manuscript:
PAPER
Category:
Information Theory
Keyword:
privacy amplification
,
secret key agreement
,
Slepian-Wolf coding
,
strong security
,
variational distance
,
weak security
,
Summary
|
Full Text:PDF
Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model
Masashi NAITO
Shun WATANABE
Ryutaroh MATSUMOTO
Tomohiko UYEMATSU
Publication:
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date:
2009/02/01
Vol.
E92-A
No.
2
;
pp.
525-534
Type of Manuscript:
PAPER
Category:
Information Theory
Keyword:
advantage distillation
,
AWGN
,
information theoretic security
,
key agreement
,
privacy amplification
,
public discussion
,
Summary
|
Full Text:PDF